Microsoft’s recent security update has caused widespread issues for dual-boot systems running both Windows and Linux. The patch, released last week, was intended to fix a two-year-old vulnerability in the GRUB bootloader used by numerous Linux distributions. However, contrary to Microsoft’s original statement, it has inadvertently impacted dual-boot machines, leaving many users unable to access their Linux partitions.
According to a report from *Ars Technica*, users of popular Linux distributions like Ubuntu, Debian, Linux Mint, and Zorin OS are encountering errors such as “security policy violation” and “something has gone seriously wrong” after applying the patch. These errors are now spreading across online forums such as Reddit and Ubuntu’s help pages, as users scramble to find solutions.
The update was meant to resolve a significant security flaw related to Secure Boot, a feature used in both Windows and Linux to prevent malicious firmware from being loaded during startup. Microsoft’s statement earlier this month assured that the patch would not target dual-boot systems. However, the fallout indicates that many users have been caught in the crossfire, locking them out of their Linux installations.
Microsoft has yet to publicly address the issues caused by this patch. For now, Ubuntu users have discovered a workaround by disabling Secure Boot in the BIOS settings. After logging in, they can delete the SBAT policy installed by Microsoft via the terminal. While this offers temporary relief for some, it remains a cumbersome fix.
This update also highlights a broader issue with Secure Boot, which has been a critical part of Windows security infrastructure since its introduction. Despite its importance, researchers have uncovered various vulnerabilities over the years, leading to the question: how secure is Secure Boot, really?
For more details on the issue, you can read the full report at https://www.theverge.com/2024/8/21/24225108/microsoft-security-update-windows-linux-dual-boot-errors